<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting site to site vpn access between networks in Cloud Networking Platform</title>
    <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417706#M5791</link>
    <description>&lt;P&gt;It shows that its for non meraki peers, but these are all meraki peers. Still use that rule section?&lt;/P&gt;</description>
    <pubDate>Fri, 04 Nov 2022 14:47:37 GMT</pubDate>
    <dc:creator>acadiana</dc:creator>
    <dc:date>2022-11-04T14:47:37Z</dc:date>
    <item>
      <title>Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417703#M5788</link>
      <description>&lt;P&gt;I have about 15 networks that are under one dashboard. I have site to site vpn enabled for 2 networks that works just fine. Today I need to connect 2 other networks that do not need to communicate with the first 2. How do I do that? It seems they can all communicate right now.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417703#M5788</guid>
      <dc:creator>acadiana</dc:creator>
      <dc:date>2022-11-04T14:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417704#M5789</link>
      <description>&lt;P&gt;You need to use the vpn firewall to create fw rules.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MX/Site-to-site_VPN/Site-to-site_VPN_Firewall_Rule_Behavior" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MX/Site-to-site_VPN/Site-to-site_VPN_Firewall_Rule_Behavior&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Another option would be to use a group policy that is using stateless fw rules. And apply that to the vlans that are part of the vpn.&lt;A href="https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Creating_and_Applying_Group_Policies#By_VLAN" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Creating_and_Applying_Group_Policies#By_VLAN&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417704#M5789</guid>
      <dc:creator>ww^</dc:creator>
      <dc:date>2022-11-04T14:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417705#M5790</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can create an L3 rule on the site-to-site VPN page.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alemabrahao_0-1667572933595.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/262746i310D06BCAC9E418D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417705#M5790</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2022-11-04T14:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417706#M5791</link>
      <description>&lt;P&gt;It shows that its for non meraki peers, but these are all meraki peers. Still use that rule section?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417706#M5791</guid>
      <dc:creator>acadiana</dc:creator>
      <dc:date>2022-11-04T14:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417707#M5792</link>
      <description>&lt;P&gt;I use It for SD-WAN and It works well.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417707#M5792</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2022-11-04T14:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417708#M5793</link>
      <description>&lt;P&gt;&lt;STRONG&gt;"These firewall rules will apply to all MX network&lt;/STRONG&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;&lt;STRONG&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;U&gt;in the organization&lt;/U&gt;&lt;/STRONG&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;STRONG&gt;that participate in site-to-site VPN (both AutoVPN and Non-Meraki)."&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417708#M5793</guid>
      <dc:creator>ww^</dc:creator>
      <dc:date>2022-11-04T14:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417709#M5794</link>
      <description>&lt;DIV class=""&gt;&lt;H3 id="toc-hId-1426027119"&gt;Overview&lt;/H3&gt;&lt;P&gt;Administrators have the ability to add firewall rules to restrict the traffic flow through the VPN tunnel for a Cisco Meraki MX Security Appliance. Similar to other Meraki firewall options, this firewall is stateful and will only block traffic if it does not match an existing flow.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;These firewall rules will apply to all MX network&lt;/STRONG&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;&lt;STRONG&gt; &lt;U&gt;in the organization&lt;/U&gt;&lt;/STRONG&gt; &lt;STRONG&gt;that participate in site-to-site VPN (both AutoVPN and Non-Meraki).&lt;/STRONG&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;H3 id="toc-hId--1126129842"&gt;Creating Firewall Rules&lt;/H3&gt;&lt;P&gt;To create a firewall rule, follow the steps below.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Navigate to &lt;STRONG&gt;Security &amp;amp; SD-WAN &amp;gt;&lt;/STRONG&gt; &lt;STRONG&gt;Configure &amp;gt; Site-to-site VPN.&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Select &lt;STRONG&gt;Add a rule&lt;/STRONG&gt; in the &lt;STRONG&gt;Site-to-site outbound firewall&lt;/STRONG&gt; under the &lt;STRONG&gt;Organization-wide settings &lt;/STRONG&gt;section of the page.&lt;/P&gt;&lt;DIV class=""&gt; &lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Fill in the desired parameters for the rule&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Select &lt;STRONG&gt;Save changes&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;H3 id="toc-hId-616680493"&gt;Considerations for VPN Firewall Rules&lt;/H3&gt;&lt;P&gt;When configuring VPN Firewall rules, it is important to remember that traffic should be stopped as close to the originating client device as possible. This cuts down on traffic over the VPN tunnel and will result in the best network performance. Because of this, site-to-site firewall rules are applied &lt;EM&gt;only &lt;/EM&gt;to outgoing traffic. &lt;U&gt;As such, the MX cannot block VPN traffic initiated by non-Meraki peers.&lt;/U&gt; &lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MX/Site-to-site_VPN/Site-to-site_VPN_Firewall_Rule_Behavior" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MX/Site-to-site_VPN/Site-to-site_VPN_Firewall_Rule_Behavior&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 04 Nov 2022 14:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417709#M5794</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2022-11-04T14:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417710#M5795</link>
      <description>&lt;P&gt;What should the rule look like. Source and Destination?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 15:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417710#M5795</guid>
      <dc:creator>acadiana</dc:creator>
      <dc:date>2022-11-04T15:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417711#M5796</link>
      <description>&lt;P&gt;Depends on your needs.. but For example: &lt;/P&gt;&lt;P&gt;Allow &amp;gt;&lt;/P&gt;&lt;P&gt;source: location1 and location2 subnet   destination: location1 and location2 subnet&lt;/P&gt;&lt;P&gt;Allow &amp;gt;&lt;/P&gt;&lt;P&gt;source: location3 and location4 subnet  destination: location3 and location4 subnet&lt;/P&gt;&lt;P&gt;Deny &amp;gt; any any&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 16:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417711#M5796</guid>
      <dc:creator>ww^</dc:creator>
      <dc:date>2022-11-04T16:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting site to site vpn access between networks</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417712#M5797</link>
      <description>&lt;H3 id="toc-hId-1426027180"&gt;Considerations for VPN Firewall Rules&lt;/H3&gt;&lt;P&gt;When configuring VPN Firewall rules, it is important to remember that traffic should be stopped as close to the originating client device as possible. This cuts down on traffic over the VPN tunnel and will result in the best network performance. Because of this, site-to-site firewall rules are applied &lt;EM&gt;only &lt;/EM&gt;to outgoing traffic. &lt;U&gt;As such, the MX cannot block VPN traffic initiated by non-Meraki peers.&lt;/U&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 17:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/restricting-site-to-site-vpn-access-between-networks/m-p/5417712#M5797</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2022-11-04T17:14:34Z</dc:date>
    </item>
  </channel>
</rss>

